Business Driven Technology
7th Edition
ISBN: 9781259567322
Author: Paige Baltzan Instructor
Publisher: McGraw-Hill Education
expand_more
expand_more
format_list_bulleted
Concept explainers
Expert Solution & Answer
Chapter B, Problem B12.5MBD
Explanation of Solution
Security issues faced by public schools:
- Inability to reach all staffs, parents and students.
- There may arise a communication barrier between entities of school.
- The communication barrier between entities may create diversion in school operations.
- Tight budget system may prevent from upgrading of subpar emergency and communication routines.
- Inability to communicate with differently abled students, independent of their location.
- Teachers as well as staff need to report their status while on move.
- Inability to distinguish between traditional attendance system and proxies that arise.
- Students may cheat in exams conducted by schools...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
TO: All Staff
FROM: Jake Ryan, Director, Product Development
DATE: October 23, 2018
SUBJECT: Launch of Product XYZ
Due to extensive customer feedback, and the results of current testing, I wanted to inform you that Product XYZ will be delayed from its original launch date of November 15th, until Q1 2019.
We are confident that time for additional testing will serve to make XYZ more effective in fighting security breaches that customers are facing. For those customers that you believe will now consider a competitor's product, the marketing department is developing a promotional offering, which sales reps can share with their customers to help reduce those who will now go to our competitors.
As disappointing as this news may be, we are confident in our employees, and know the additional time will serve this company well by creating a more successful product.
Interview practicing counselors about some of their most pressing ethical concerns in carrying out their responsibilities. How have they dealt with these ethical issues? Have technological innovations such as cloud computing and online counseling raised new ethical concerns? What are some of their legal considerations? What are their concerns, if any, about malpractice suits?
Founded in April 1996, Antheus Tecnologia develops and distributes Automated Fingerprint Identification Systems [AFIS], automated fingerprinting, and other systems such as iris recognition devices. Antheus Tecnologia also claims that it is the first Brazilian company to be certified by the US Federal Bureau of Investigation [FBI] and develops biometric solutions for domestic and overseas clients.
In March 2020, the security research team at SafetyDetectives discovered a significant data leak in addition to other security flaws [such as lack of password protection] relating to fingerprint data on an Antheus log server in Brazil. The research team discovered almost 2.3 million data points in total and estimated that 76,000 unique fingerprints were found on the database. Approximately 16 gigabytes of data were found on the Elasticsearch server, including highly sensitive information related to identification and biometric details.
The Antheus server investigated by the security team is an…
Chapter B Solutions
Business Driven Technology
Ch. B - Prob. B1.1MBDCh. B - Prob. B1.2MBDCh. B - Prob. B1.3MBDCh. B - Prob. B1.4MBDCh. B - Prob. B1.5MBDCh. B - Prob. B1.6MBDCh. B - Prob. B2.1MBDCh. B - Modeling a Business Process Do you hate waiting in...Ch. B - Prob. B2.3MBDCh. B - Prob. B2.4MBD
Ch. B - Prob. B2.5MBDCh. B - Prob. B3.1MBDCh. B - Prob. B3.2MBDCh. B - Prob. B4.1MBDCh. B - Prob. B4.2MBDCh. B - Prob. B4.3MBDCh. B - Prob. B4.4MBDCh. B - Prob. B4.5MBDCh. B - Prob. B4.6MBDCh. B - Prob. B4.7MBDCh. B - Prob. B4.8MBDCh. B - Prob. B4.9MBDCh. B - Prob. B4.10MBDCh. B - Prob. B4.11MBDCh. B - Prob. B5.1MBDCh. B - Prob. B5.2MBDCh. B - Prob. B5.3MBDCh. B - Prob. B5.4MBDCh. B - Prob. B5.5MBDCh. B - Prob. B5.6MBDCh. B - Prob. B6.1MBDCh. B - Prob. B6.2MBDCh. B - Prob. B6.3MBDCh. B - Prob. B6.4MBDCh. B - Prob. B6.5MBDCh. B - Prob. B7.1MBDCh. B - Prob. B7.2MBDCh. B - Prob. B7.3MBDCh. B - Prob. B7.4MBDCh. B - Prob. B7.5MBDCh. B - Prob. B7.6MBDCh. B - Prob. B7.7MBDCh. B - Prob. B7.8MBDCh. B - Prob. B7.9MBDCh. B - Prob. B7.10MBDCh. B - Prob. B7.11MBDCh. B - Prob. B8.1MBDCh. B - Prob. B8.2MBDCh. B - Prob. B9.1MBDCh. B - Prob. B9.2MBDCh. B - Prob. B9.3MBDCh. B - Prob. B9.4MBDCh. B - Prob. B9.5MBDCh. B - Prob. B9.6MBDCh. B - Prob. B9.7MBDCh. B - Prob. B9.8MBDCh. B - Prob. B9.9MBDCh. B - Prob. B9.10MBDCh. B - Prob. B10.1MBDCh. B - Prob. B10.2MBDCh. B - Prob. B10.3MBDCh. B - Prob. B10.4MBDCh. B - Prob. B10.5MBDCh. B - Prob. B11.1MBDCh. B - Prob. B11.2MBDCh. B - Prob. B11.3MBDCh. B - Prob. B11.4MBDCh. B - Prob. B12.1MBDCh. B - Prob. B12.2MBDCh. B - Prob. B12.3MBDCh. B - Prob. B12.4MBDCh. B - Prob. B12.5MBDCh. B - Prob. B12.6MBD
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- "A software by a company called Gaggle [was purchased to be used] to monitor student accounts and [student] writing [but also protecting students from harm in social media uses]. However, many students are unsure of what Gaggle does or unaware that it even exists. Asha Graffunder, a sophomore at Roosevelt said. "I see little to no problem with Gaggle itself, its purpose is to provide schools with information that can help protect students. I see way more of a problem with school administrations and how they handle the flags they get from Gaggle." 1: Identify and state 3 ethical problems in this case study. 2: Say why each is a problem of ethics, based on morality. 3: what should be done about each of the 3 ethical problems identified?arrow_forwardYou are assigned as a Cyber Investigator to a Computer Crimes Unit within the Department of Homeland Security. In your role, you are responsible for responding to crime scenes to collect items of digital evidence and conducting subsequent examinations of the things ordered. Legal analysis is inherent in your position, and you are required to document your legal authority for each investigation. Today, you responded to a College Dormitory to investigate an unidentified individual downloading Child Sexual Abuse Material (CSAM). In the proceeding days, you downloaded 200 Gigabytes of known CSAM from a user over Peer2Peer software. During the download, you were able to identify the Suspect's Internet Protocol Address, as well as a Port Number. You specified the Suspect was using IP Address 71.143.70.239:8451. Subsequently, the Internet Service Provider identified that l leased the IP Address to University Dorm Rooms. After coordinating with the university Office of Technology…arrow_forwarda consulting team has been formed to advise a group of managers who are to review the technology policies for their organizations. They need to be briefed on some of the issues and responsibilities around information systems. The team is not advising them about policies nor making recommendations; their task is just to provide background information about some key issues. Business continuity planning and disaster recovery Customer/client privacy Responses to legal constraints (for example Sarbanes-Oxley and the Patriot Act) Green IT Accessibility Health problems related to computer use The discussions should center around how the team would want to address these concerns.arrow_forward
- you will be writing an essay to discuss the evolution of hacking. Your Essay should highlight the evolution of hacking from individuals to corporations (and their predominate locations) to cyber warfare. Include at least 5 different locations and events (more is better) to tell the story of how hacking has changed over time from the 1940's to present. Use your specific events to illustrate both when and what happened in each of these locations/events that changed the face of hacking as well as the global nature of hacking. The events should be presented in time order. Also include images or figures, and any additional visual aids to help tell your story. Where did the hack originate, who was the target if known, how did this event affect hacking as we know it, what was significant about this event. Your 5 or more locations should include at least 2 (preferably 3 or more) international locations as well as at least one United States location.arrow_forwardThis paper aims to provide guidance on the development of a Bring Your Own Device (BYOD) policy for employees, customers, and guests in the context of a nursery business. The policy will outline the rules and regulations governing the use of personal devices in the workplace, with the aim of ensuring the security and privacy of sensitive information. The policy will consider the unique needs and challenges of a nursery business, and will provide clear guidelines for the appropriate use of person What are the differences between them in relation to each specific group?arrow_forwardUsing a graphics program, design several security awareness posters on the following themes: updating antivirus signatures, protecting sensitive information, watching out for e-mail viruses, prohibiting the personal use of company equipment, changing and protecting passwords, avoiding social engineering, and protecting software copyrights. What other themes can you imagine?arrow_forward
- What are the most significant advantages of the HealthConnect system for Kaiser Permanente members? Are there any potential hazards or ethical concerns related with the usage of this technology by Kaiser health plan subscribers? How would you respond to these questions as a physician or nurse?arrow_forwardWhat are some outdated Information Technology assets (hardware, software, etc.) that a company should upgrade or replace? Coming from this scenario: You are the Information Technology manager for a company that make widgets for several clients all over the world. The company has been using outdated information technology assets for years to do business. The CEO wants you to update the company’s IT infrastructure and equipment to better position the company to compete in today’s global marketplace. You must perform an assessment of the company’s current outdated Information Technology assets (hardware, software, etc.) and make recommendations for upgrades or replacement of those systems by writing a white paper for your upper management. I am having a really hard time coming up with a list for the company's current outdated Information Technology assets to base my white paper on.arrow_forwardAs a security officer, you have been asked to help the company's recruiting officer in the creation of a new job description. Employee recruitment security procedure that the business wants to use for all future recruiting reasons. Provide a succinct but thorough paper that must include the most critical security topics that the company must address. When it comes to hiring new personnel, this is what you should pay attention to.arrow_forward
- Imagine that your team has been hired to conduct a review of the information system policies and procedures employed in the student registration department at your school or university. Develop a list of at least 10 specific questions that your team would use to assess the effectiveness of these policies and procedures in reducing mistakes, waste, and costs.arrow_forwardYou work at a company that develops facial recognition software for various applications; a team member points out that shelters for victims of domestic violence are also organizations greatly concerned with the security of their guests and staff, and might have use for this technology. It could ensure that people entering or approaching the shelter are registered guests or staff there and not unwelcome intruders, and could perhaps aid staff in monitoring and analyzing behavior in the shelter environment. Should this project be pursued? If not, why not? If so, how could it be done ethically? What unique ethical concerns does it raise? What additional facts might be required?] What practical steps might you need to take in order to access the information/perspectives needed to manage the ethical landscape of this project? What are some other ethical issues that any designers/developers of such an application would need to address? As a project team, how might you go about sorting…arrow_forwardThere are some people in the IT security field who feel their firms should hire ex-computer criminals as consultants to find holes in their security measures. Do you think so? Is there a good reason or a bad reason?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning